8-PORT /16-PORT RACKMOUNT KVM SWITCH USERMANUAL MODELS 524629 & 524643 INT-524629/524643-UM-0309-01Shown: 16-Port, Model 52464352462
10 Auto-Scan: <F2>This function automatically scans through all the connected ports in the switch system, with a banner displayed to indicate th
11 Authorized User Setup — To change the username and/or password for any of the three authorized users who are allowed to manage the KVM switch
12 1. Make sure any and all cables are disconnected from the KVM switch: This includes port connections to computers and keyboard/mouse/monitor con
13 5. Select “USB Console,” “PS/2 Console” or “OSD,” then click the le browsing button to the right of the “Filename” text eld to select the rm
14 TROUBLESHOOTINGIf one or more of the following problems occur during the opertion of your Rackmount KVM Switch, try the recommended action before c
15 SPECIFICATIONSStandards• USB 1.1 / 2.0General• PC connections: - Model 524629: 8 - Model 524643: 16• Console connections: 1• PC port con
INTELLINET NETWORK SOLUTIONS™ offers a complete line of active and passive networking products. Ask your local computer dealer for more information or
524629_524643_01_man.indd 2 3/9/09 9:22:10 AM
3 Thank you for purchasing this INTELLINET NETWORK SOLUTIONS™ Rackmount KVM Switch, Model 524629 (8-Port) or Model 524643 (16-Port).Designed for compu
4 1 2 3 4 5 6
5 Single-Stage InstallationWhen you’re creating a switch system using only a single KVM Switch, it can be connected to the computer(s) three ways. C
6 providing control of as many as 256 KVM switches from a single control console. A cascade conguration expands system ability and allows you to sele
7 OSD MenuTo view the main menu of the OSD on the console monitor, press <Scroll Lock> + <Scroll Lock> + <Enter>. All of the KVM swi
8 BuzzerTo enable/disable the buzzer (actually, a beeping sound) and to toggle between the two settings, press <Scroll Lock> + <Scroll Lock&g
9 Logged-In Username — The system allows the designation of one administrator and three users for security management (see Security: <F5>). Th
Kommentare zu diesen Handbüchern